Security Backdoors and Surveillance Mechanisms Reportedly Found in iOS Devices [u]

iOS encryption overview

Security researcher and iOS forensics expert Jonathan Zdziarski has published a paper and hosted a talk at HOPE/X about identifying backdoors, attack points, and surveillance mechanisms in iOS devices.

Zdziarski has found that there are several services in iOS that reportedly facilitate organizations like the NSA. The services do not require the user to be in developer mode for them to work, therefore they are available on every iOS device.

For example, one of these services that Zdziarski points out in his presentation slides is a packet sniffer called “com.apple.pcapd”. The service “dumps network traffic and HTTP request/response data traveling into and out of the device” and can be targeted via WiFi for remote monitoring.

The packet sniffer is active on every iOS device and can be run without any visual indication to the user. Here is a slide which shows a snippet of data from the packet sniffer:

iOS_packet_sniffer

Over the past several years, Apple has continuously promoted user security and privacy in iOS. However, according to findings by Zdziarski, he believes this does not seem to be the case, as his research claims the company is making it even easier to get your data.

Zdziarski’s journal paper can be purchased for a small fee or you can read through his presentation slides from his HOPE/X talk for free. For anyone interested in the security mechanisms found in iOS, the presentation slides are an interesting read.

Contrary to this research, Apple has long stated it does not work with the NSA and their iOS devices are secure, as reiterated by CEO Tim Cook.

[via Twitter]

Want to see more of our stories on Google?

Add iPhone in Canada as a Preferred Source on Google

P.S. Want to keep this site truly independent? Support us by buying us a beer, treating us to a coffee, or shopping through Amazon here. Links in this post are affiliate links, so we earn a tiny commission at no charge to you. Thanks for supporting independent Canadian media!

Subscribe
Notify of
guest
9 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Jim
Jim
11 years ago

Link bait! I’m guessing iOS is still far more secure than Windows and Android.

Robby2716
Robby2716
Reply to  Jim
11 years ago

Unless you work for Apple, Google and Microsoft you can never say for certain which is more secure. The researcher above found proof that iOS is collecting your information and data about your activity.

Malaki
Malaki
Reply to  Robby2716
11 years ago

You don’t have to work for Google to be sure your Android is secure, all you have to do is installing AOSP-based ROM, one you have the sources for.

And no, iOS s not more secure than Android.

Lauren Glenn
Lauren Glenn
11 years ago

Wow….. Windows Phone! Or get an Android device and encrypt the device. One other reason I don’t want Apple devices….. that and the horrid music sound quality.

speedracer99
speedracer99
Reply to  Lauren Glenn
11 years ago

You should be more concerned with Google and your android device. Biggest spies out there.

North
North
Reply to  Lauren Glenn
11 years ago

Try changing your ear/headphones, mp3/ogg quality maybe? The device has nothing to do with the quality of the music.

Malaki
Malaki
Reply to  North
11 years ago

The device have EVERYTHING to do with the quality of music, it’s called digital signal processing, and more precisely here, it’s the digital-to-analog conversion which suck on most Apple embedded devices. If the device don’t produce good signals, you can play the best quality audio file, on the best quality headphones, the quality will still be mediocre.

I can’t believe how people can be so ignorant and yet think they know everything.

m Arch Tom's on Bar N Ass
m Arch Tom's on Bar N Ass
11 years ago

No Kidding! How Bizarre ! marc

cinergi
cinergi
11 years ago

This article is misleading. The pcap packet capture library is very common (standard) on Unix-like systems like iOS. Its presence doesn’t mean it’s being used to spy on you unless there’s an app running on your phone that is actively using it. There are billions of Unix-like and Windows computers with pcap installed.

9
0
Would love your thoughts, please comment.x
()
x